Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment

Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing envi...

Full description

Saved in:  
Bibliographic Details
Main Author: Berenblum, Tamar (Author)
Contributors: Maimon, David ; Fisher, Daren
Format: Electronic Book
Language:English
Published: 2021
In:Year: 2021
Online Access: Volltext (kostenfrei)
Check availability: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866131656
003 DE-627
005 20250113054900.0
007 cr uuu---uuuuu
008 231018s2021 xx |||||o 00| ||eng c
035 |a (DE-627)1866131656 
035 |a (DE-599)KXP1866131656 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Berenblum, Tamar  |e VerfasserIn  |4 aut 
245 1 0 |a Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and decreasing the likelihood of hackers returning to a previously hacked environment. Our findings suggest some novel and readily implemented strategies for reducing cybercrime 
700 1 |a Maimon, David  |e VerfasserIn  |4 aut 
700 1 |a Fisher, Daren  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/389658478.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 439181241X 
LOK |0 003 DE-627 
LOK |0 004 1866131656 
LOK |0 005 20231018043647 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE9096854 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw